Believe it or not, malicious code has been around for half a century already. What started as an education lab experiment made its way into the wild, wreaking havoc on companies and home users alike. Famous examples of malicious code criminal activity in recent history include the 2019 Texas ransomware attack or the 2018 Trojan […]
Have you, a colleague or a friend ever received a suspicious email? It is of paramount importance to know how to report email fraud in order to avoid all the unpleasant consequences that might come from it, especially if we’re talking about the compromise of your business email – revenue loss, data breach, reputation damage, […]
The post How to Report Email Fraud: Learn What to Do If It Happens to You appeared first on Heimdal Security Blog.
Machine learning is usually mentioned in contexts that actually refer to artificial intelligence or used as a synonym. Let us have a closer look at what the terms artificial intelligence, machine learning and deep learning (another common notion used in relation to AI) really mean. We will also discuss how we can use machine learning […]
The post Machine Learning in Cybersecurity: The New Essential for Enhanced Performance appeared first on Heimdal Security Blog.
We’re all familiar with terms such as “threat-hunting”, “boots on the ground Intelligence” or “DNS traffic filtering.” Going back to one’s roots is always a good idea and today I’ll do just that. This article is dedicated to malicious applications. Indeed, we are going to talk about the malicious app definition, what makes an app […]
The cyber kill chain model offers a detailed perspective and the appropriate methods to recognize incidents surrounding an attack against an organization. This model allows security teams to impede the assault during a certain stage and consequently design stronger security and enhance their incident response and analysis capabilities. Throughout the past couple of decades, cyber […]
Have you ever wondered what intelligence means? This characteristic of humans encompasses – but it’s not limited to – learning, reasoning, problem-solving, perception and the use of language. These are also the characteristics that AI researchers have focused on, in order to find solutions for various aspects of our society today. The one we’ll focus […]
The post Artificial Intelligence in Cybersecurity: The Culture of the Future appeared first on Heimdal Security Blog.
Peter Thiel of Palantir Technologies and PayPal once said that every time an email is written, it gets broadcasted into the public domain, which is not as secure as people (end-users) tend, or led to – believe. This land of endless possibilities (and probabilities) which is the public domain has taken the stand more than […]
A new year brings about countless new opportunities, but also, unfortunately, the chance for previous menaces to grow and evolve. Such is the case with Egregor ransomware. Since anticipation and prevention are more than welcome, let’s find out more about it and what you can do to combat it in order to keep your business […]
The post Egregor Ransomware: Origins, Operating Mode, Recent Incidents appeared first on Heimdal Security Blog.